b.
Change the cryptographic keys when employees leave the organization.c.
Protect data prior to signature generation/verification or encryption/decryption.d.
Provide the capability for local users to view all data that is being signed or encrypted.111. During the operation and maintenance phase of a system development life cycle (SDLC) as it relates to cryptography, which of the following requires configuration management
most?1.
Hardware and firmware2.
System software maintenance and update3.
Application software maintenance4.
Cryptographic key maintenancea.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 4The application software maintenance scope covers updating passwords, deleting users from access lists, updating remote access, and changing roles and responsibilities of users and maintenance personnel, which are mostly routine in nature. The cryptographic key maintenance scope includes key archiving, key destruction, and key change, as it is mostly done in the disposal phase.
112. During the operational phase of cryptography, key recovery means which of the following?
1.
Acquiring keying material from backup2.
Acquiring keying material by reconstruction3.
Binding keying material to information4.
Binding keying material to attributesa.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 4113. During the operational phase of cryptography, which of the following keying material does
a.
Domain parametersb.
Passwordsc.
Audit informationd.
Random number generator seedDomain parameters are incorrect because they can be backed up. It is a parameter used with some public key algorithm to generate key pairs, to create digital signatures, or to establish keying material. Passwords are incorrect because they can be backed up. A password is a string of characters (for example, letters, numbers, and other symbols) that are used to authenticate an identity or to verify access authorization. Audit information is incorrect because it can be backed up and can be used to trace events and actions.
114. During the post-operational phase of cryptography, which of the following keying material does
a.
Initialization vectorb.
Audit informationc.
Passwordsd.
Domain parameters